Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.6.26.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.6.26.199.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030100 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 17:17:13 CST 2020
;; MSG SIZE  rcvd: 116
Host info
199.26.6.114.in-addr.arpa domain name pointer 114-6-26-199.resources.indosat.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.26.6.114.in-addr.arpa	name = 114-6-26-199.resources.indosat.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.22.95.49 attackbotsspam
Sep 16 08:42:46 ws12vmsma01 sshd[10412]: Failed password for invalid user usuario from 201.22.95.49 port 42441 ssh2
Sep 16 08:50:13 ws12vmsma01 sshd[11510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.95.49.static.gvt.net.br  user=zabbix
Sep 16 08:50:15 ws12vmsma01 sshd[11510]: Failed password for zabbix from 201.22.95.49 port 35871 ssh2
...
2020-09-17 00:01:14
106.12.13.20 attackbotsspam
 TCP (SYN) 106.12.13.20:44809 -> port 8557, len 44
2020-09-17 00:16:25
5.188.210.18 attackbotsspam
Unauthorized access detected from black listed ip!
2020-09-17 00:18:06
74.120.14.78 attack
Port Scan detected!
...
2020-09-16 23:44:51
201.102.59.240 attackspambots
Sep 16 17:26:09 ns382633 sshd\[20281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.102.59.240  user=root
Sep 16 17:26:11 ns382633 sshd\[20281\]: Failed password for root from 201.102.59.240 port 54242 ssh2
Sep 16 17:30:11 ns382633 sshd\[20932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.102.59.240  user=root
Sep 16 17:30:13 ns382633 sshd\[20932\]: Failed password for root from 201.102.59.240 port 43428 ssh2
Sep 16 17:32:18 ns382633 sshd\[21250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.102.59.240  user=root
2020-09-17 00:05:50
114.235.181.159 attack
Sep 16 06:39:01 NPSTNNYC01T sshd[29499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.235.181.159
Sep 16 06:39:03 NPSTNNYC01T sshd[29499]: Failed password for invalid user Administrator from 114.235.181.159 port 10853 ssh2
Sep 16 06:43:30 NPSTNNYC01T sshd[29879]: Failed password for root from 114.235.181.159 port 13096 ssh2
...
2020-09-16 23:58:20
141.98.10.210 attack
Sep 16 17:43:12 vps647732 sshd[28630]: Failed password for root from 141.98.10.210 port 43301 ssh2
...
2020-09-17 00:10:50
208.113.164.202 attack
<6 unauthorized SSH connections
2020-09-16 23:41:47
75.130.124.90 attackspam
(sshd) Failed SSH login from 75.130.124.90 (US/United States/075-130-124-090.biz.spectrum.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 15:02:49 amsweb01 sshd[29255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.130.124.90  user=root
Sep 16 15:02:51 amsweb01 sshd[29255]: Failed password for root from 75.130.124.90 port 24854 ssh2
Sep 16 15:18:37 amsweb01 sshd[31681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.130.124.90  user=root
Sep 16 15:18:39 amsweb01 sshd[31681]: Failed password for root from 75.130.124.90 port 34193 ssh2
Sep 16 15:22:49 amsweb01 sshd[32363]: Invalid user nicolas from 75.130.124.90 port 40229
2020-09-17 00:10:22
181.114.195.121 attackbots
$f2bV_matches
2020-09-16 23:52:21
80.98.244.205 attackbots
Sep 16 12:47:07 piServer sshd[19991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.98.244.205 
Sep 16 12:47:09 piServer sshd[19991]: Failed password for invalid user herman from 80.98.244.205 port 47180 ssh2
Sep 16 12:52:38 piServer sshd[20549]: Failed password for root from 80.98.244.205 port 53009 ssh2
...
2020-09-16 23:55:54
182.176.132.99 attack
Unauthorized connection attempt from IP address 182.176.132.99 on Port 445(SMB)
2020-09-16 23:49:37
104.198.16.231 attackspambots
web-1 [ssh] SSH Attack
2020-09-17 00:22:47
106.54.255.11 attack
Sep 16 08:28:20 abendstille sshd\[27176\]: Invalid user nodeproxy from 106.54.255.11
Sep 16 08:28:20 abendstille sshd\[27176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.255.11
Sep 16 08:28:22 abendstille sshd\[27176\]: Failed password for invalid user nodeproxy from 106.54.255.11 port 53742 ssh2
Sep 16 08:33:52 abendstille sshd\[32480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.255.11  user=root
Sep 16 08:33:54 abendstille sshd\[32480\]: Failed password for root from 106.54.255.11 port 57118 ssh2
...
2020-09-16 23:56:45
89.216.47.154 attackspam
$f2bV_matches
2020-09-16 23:52:52

Recently Reported IPs

166.61.244.158 74.208.101.7 139.229.168.48 86.84.240.117
186.215.168.255 132.148.182.88 220.174.34.119 168.62.49.194
212.224.0.143 188.131.232.59 3.30.246.208 158.151.70.214
215.71.34.173 145.221.141.8 51.39.17.143 87.8.216.119
103.125.217.138 27.74.191.124 181.52.172.107 220.11.228.237